header-logo
Suggest Exploit
vendor:
DI-614+, DI-704, DI-624 Routers
by:
Unknown
7.5
CVSS
HIGH
HTML Injection
79
CWE
Product Name: DI-614+, DI-704, DI-624 Routers
Affected Version From: DI-614+, DI-704, DI-624
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: h:d-link:di-614+ cpe:/h:d-link:di-704 cpe:/h:d-link:di-624
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

HTML Injection Vulnerability in DI-614+, DI-704, and DI-624 Routers

An attacker with access to the wireless or internal network segments of the DI-614+, DI-704, and DI-624 routers can craft malicious DHCP hostnames that, when sent to the router, will be logged and can cause unintended changes to the router's configuration. Other attacks may also be possible.

Mitigation:

No specific mitigation provided
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10587/info

It is reported that the DI-614+, DI-704, and the DI-624 are susceptible to an HTML injection vulnerability in their DHCP log.

An attacker who has access to the wireless, or internal network segments of the router can craft malicious DHCP hostnames, that when sent to the router, will be logged for later viewing by the administrator of the device.

The injected HTML can be used to cause the administrator to make unintended changes to the configuration of the router. Other attacks may be possible.

Although only the DI-614+, DI-704, and the DI-624 are reported vulnerable, code reuse across devices is common and other products may also be affected.

By sending four requests, all containing hostnames like the following, a complete HTML tag would be rendered, instructing the browser to request the 'restore.cgi' file.
<iframe id='
' height=0 id='
' width=0 id='
' src='restore.cgi'>